Threatbook.com Site Title

微步在线-数字时代网络威胁应对专家

Threatbook.com Meta Description

微步在线,网络威胁发现和响应专家,开创并引领中国威胁情报行业的发展,提供流量检测、终端安全、主机安全、云上安全、安全DNS、网关、蜜罐、沙箱、威胁分析和情报共享、安全服务等全方位威胁检测产品及服务。

Threatbook.com Test Results

Threatbook.com Mobile Performance: 41/100
Quick overview:
Max Potential First Input Delay
1,250 ms
The maximum potential First Input Delay that your users could experience is the duration of the longest task. Learn more about the Maximum Potential First Input Delay metric.
Time to Interactive
14.9 s
Time to Interactive is the amount of time it takes for the page to become fully interactive. Learn more about the Time to Interactive metric.
First Meaningful Paint
5.4 s
First Meaningful Paint measures when the primary content of a page is visible. Learn more about the First Meaningful Paint metric.
Script Treemap Data
Used for treemap app
Tasks
Lists the toplevel main thread tasks that executed during page load.
Network Round Trip Times
400 ms
Network round trip times (RTT) have a large impact on performance. If the RTT to an origin is high, it's an indication that servers closer to the user could improve performance. Learn more about the Round Trip Time.
Network Requests
Lists the network requests that were made during page load.
Server Backend Latencies
580 ms
Server latencies can impact web performance. If the server latency of an origin is high, it's an indication the server is overloaded or has poor backend performance. Learn more about server response time.
Diagnostics
Collection of useful page vitals.
Metrics
Collects all available metrics.
Final Screenshot
The last screenshot captured of the pageload.

1489283442946


Threatbook.com Mobile SEO: 100/100
Quick overview:

Threatbook.com Mobile Best Practices: 68/100
Quick overview:
Trust and Safety
Does not use HTTPS
1 insecure request found
All sites should be protected with HTTPS, even ones that don't handle sensitive data. This includes avoiding mixed content, where some resources are loaded over HTTP despite the initial request being served over HTTPS. HTTPS prevents intruders from tampering with or passively listening in on the communications between your app and your users, and is a prerequisite for HTTP/2 and many new web platform APIs. Learn more about HTTPS.
Ensure CSP is effective against XSS attacks
A strong Content Security Policy (CSP) significantly reduces the risk of cross-site scripting (XSS) attacks. Learn how to use a CSP to prevent XSS
User Experience
Displays images with incorrect aspect ratio
Image display dimensions should match natural aspect ratio. Learn more about image aspect ratio.
General
Missing source maps for large first-party JavaScript
Source maps translate minified code to the original source code. This helps developers debug in production. In addition, Lighthouse is able to provide further insights. Consider deploying source maps to take advantage of these benefits. Learn more about source maps.
Registers an `unload` listener
The `unload` event does not fire reliably and listening for it can prevent browser optimizations like the Back-Forward Cache. Use `pagehide` or `visibilitychange` events instead. Learn more about unload event listeners
Detected JavaScript libraries
All front-end JavaScript libraries detected on the page. Learn more about this JavaScript library detection diagnostic audit.
Threatbook.com Mobile PWA: 38/100
Quick overview:
PWA Optimized
Manifest doesn't have a maskable icon
A maskable icon ensures that the image fills the entire shape without being letterboxed when installing the app on a device. Learn about maskable manifest icons. No manifest was fetched
Does not set a theme color for the address bar.
The browser address bar can be themed to match your site. Learn more about theming the address bar. Failures: No manifest was fetched, No `<meta name="theme-color">` tag found.
Is not configured for a custom splash screen
A themed splash screen ensures a high-quality experience when users launch your app from their homescreens. Learn more about splash screens. Failures: No manifest was fetched.
Installable
Web app manifest or service worker do not meet the installability requirements
1 reason
Service worker is the technology that enables your app to use many Progressive Web App features, such as offline, add to homescreen, and push notifications. With proper service worker and manifest implementations, browsers can proactively prompt users to add your app to their homescreen, which can lead to higher engagement. Learn more about manifest installability requirements.
Threatbook.com Mobile Accessibility: 84/100
Quick overview:
Names and labels
These are opportunities to improve the semantics of the controls in your application. This may enhance the experience for users of assistive technology, like a screen reader.
Links do not have a discernible name
Link text (and alternate text for images, when used as links) that is discernible, unique, and focusable improves the navigation experience for screen reader users. Learn how to make links accessible.
Navigation
These are opportunities to improve keyboard navigation in your application.
The page contains a heading, skip link, or landmark region
Adding ways to bypass repetitive content lets keyboard users navigate the page more efficiently. Learn more about bypass blocks.
Best practices
These items highlight common accessibility best practices.
`[user-scalable="no"]` is used in the `<meta name="viewport">` element or the `[maximum-scale]` attribute is less than 5.
Disabling zooming is problematic for users with low vision who rely on screen magnification to properly see the contents of a web page. Learn more about the viewport meta tag.
Contrast
These are opportunities to improve the legibility of your content.
Background and foreground colors do not have a sufficient contrast ratio.
Low-contrast text is difficult or impossible for many users to read. Learn how to provide sufficient color contrast.
Identical links have the same purpose.
Links with the same destination should have the same description, to help users understand the link's purpose and decide whether to follow it. Learn more about identical links.
Touch targets have sufficient size and spacing.
Touch targets with sufficient size and spacing help users who may have difficulty targeting small controls to activate the targets. Learn more about touch targets.
Document has a main landmark.
One main landmark helps screen reader users navigate a web page. Learn more about landmarks.
Similar tests
www.threatbook.com
www.threatbook.net
www.threatbook.org
www.threatbook.info
www.threatbook.biz
www.threatbook.us
www.threatbook.mobi
www.hreatbook.com
www.threatbook.com
www.rhreatbook.com
www.trhreatbook.com
www.rthreatbook.com
www.fhreatbook.com
www.tfhreatbook.com
www.fthreatbook.com
www.ghreatbook.com
www.tghreatbook.com
www.gthreatbook.com
www.yhreatbook.com
www.tyhreatbook.com
www.ythreatbook.com
www.treatbook.com
www.tbreatbook.com
www.thbreatbook.com
www.tbhreatbook.com
www.tgreatbook.com
www.thgreatbook.com
www.tyreatbook.com
www.thyreatbook.com
www.tureatbook.com
www.thureatbook.com
www.tuhreatbook.com
www.tjreatbook.com
www.thjreatbook.com
www.tjhreatbook.com
www.tnreatbook.com
www.thnreatbook.com
www.tnhreatbook.com
www.theatbook.com
www.theeatbook.com
www.threeatbook.com
www.thereatbook.com
www.thdeatbook.com
www.thrdeatbook.com
www.thdreatbook.com
www.thfeatbook.com
www.thrfeatbook.com
www.thfreatbook.com
www.thteatbook.com
www.thrteatbook.com
www.thtreatbook.com
www.thratbook.com
www.thrwatbook.com
www.threwatbook.com
www.thrweatbook.com
www.thrsatbook.com
www.thresatbook.com
www.thrseatbook.com
www.thrdatbook.com
www.thredatbook.com
www.thrratbook.com
www.threratbook.com
www.thrreatbook.com
www.thretbook.com
www.threqtbook.com
www.threaqtbook.com
www.threqatbook.com
www.threwtbook.com
www.threawtbook.com
www.threstbook.com
www.threastbook.com
www.threztbook.com
www.threaztbook.com
www.threzatbook.com
www.threabook.com
www.threarbook.com
www.threatrbook.com
www.threartbook.com
www.threafbook.com
www.threatfbook.com
www.threaftbook.com
www.threagbook.com
www.threatgbook.com
www.threagtbook.com
www.threaybook.com
www.threatybook.com
www.threaytbook.com
www.threatook.com
www.threatvook.com
www.threatbvook.com
www.threatvbook.com
www.threatgook.com
www.threatbgook.com
www.threathook.com
www.threatbhook.com
www.threathbook.com
www.threatnook.com
www.threatbnook.com
www.threatnbook.com
www.threatbok.com
www.threatbiok.com
www.threatboiok.com
www.threatbiook.com
www.threatbkok.com
www.threatbokok.com
www.threatbkook.com
www.threatblok.com
www.threatbolok.com
www.threatblook.com
www.threatbpok.com
www.threatbopok.com
www.threatbpook.com
www.threatboik.com
www.threatbooik.com
www.threatbokk.com
www.threatbookk.com
www.threatbolk.com
www.threatboolk.com
www.threatbopk.com
www.threatboopk.com
www.threatboo.com
www.threatbooj.com
www.threatbookj.com
www.threatboojk.com
www.threatbooi.com
www.threatbooki.com
www.threatboom.com
www.threatbookm.com
www.threatboomk.com
www.threatbool.com
www.threatbookl.com
www.threatbooo.com
www.threatbooko.com
www.threatboook.com
www.threatbook.con
Last Tested: